Web Application Penetration
1
Pr. Saeed Alam
Mohammad Saber
2
Reza Duty
Rd313.ir
3
Topics
• What is Security
• What is computer security
• Web application security
• OWASP
• OWASP Top ten vulnerability
• React Vulnerability
4
What is Security ?
5
What is Security
Security is freedom from, or resilience against,
potential harm (or other unwanted coercive change)
caused by others
6
What is Computer Security ?
7
What is Computer Security
Computer security, cybersecurity or information technology security
(IT security) is the protection of computer systems from theft or damage
to their hardware, software or electronic data,
as well as from disruption or misdirection of the services they provide.
8
Web Application Security
9
Web application security
Web application security is a branch of information security that deals
specifically with security of websites, web applications and web services.
At a high level, web application security draws on the principles
of application security but applies them specifically to internet
and web systems.
10
Web application security
11
OWASP
12
OWASP
13
OWASP Top Ten Vulnerability
1-injection
14
OWASP Top Ten Vulnerability
1-Injection
15
OWASP Top Ten Vulnerability
1-Injection
16
OWASP Top Ten Vulnerability
1-Injection
17
OWASP Top Ten Vulnerability
2-Broken Authentication
18
OWASP Top Ten Vulnerability
2-Broken Authentication
19
OWASP Top Ten Vulnerability
2-Broken Authentication
20
OWASP Top Ten Vulnerability
2-Broken Authentication
21
OWASP Top Ten Vulnerability
3-Sensitive Data Exposure
22
OWASP Top Ten Vulnerability
3-Sensitive Data Exposure
23
OWASP Top Ten Vulnerability
3-Sensitive Data Exposure
24
OWASP Top Ten Vulnerability
4-XML External Entities
25
OWASP Top Ten Vulnerability
4-XML External Entities
26
OWASP Top Ten Vulnerability
4-XML External Entities
27
OWASP Top Ten Vulnerability
4-XML External Entities
28
OWASP Top Ten Vulnerability
5-Broken Access Control
29
OWASP Top Ten Vulnerability
5-Broken Access Control
30
OWASP Top Ten Vulnerability
5-Broken Access Control
31
OWASP Top Ten Vulnerability
5-Broken Access Control
32
OWASP Top Ten Vulnerability
6-Security Misconfiguration
33
OWASP Top Ten Vulnerability
6-Security Misconfiguration
34
OWASP Top Ten Vulnerability
6-Security Misconfiguration
35
OWASP Top Ten Vulnerability
7-Cross Site Scripting(XSS)
36
OWASP Top Ten Vulnerability
7-Cross Site Scripting(XSS)
37
OWASP Top Ten Vulnerability
7-Cross Site Scripting(XSS)
38
OWASP Top Ten Vulnerability
7-Cross Site Scripting(XSS)
39
OWASP Top Ten Vulnerability
8-Insecure Deserialization
40
OWASP Top Ten Vulnerability
8-Insecure Deserialization
41
OWASP Top Ten Vulnerability
8-Insecure Deserialization
42
OWASP Top Ten Vulnerability
9-Using Components with Known Vulnerabilities
43
OWASP Top Ten Vulnerability
9-Using Components with Known Vulnerabilities
44
OWASP Top Ten Vulnerability
9-Using Components with Known Vulnerabilities
45
OWASP Top Ten Vulnerability
10-Insufficient Logging&Monitoring
46
OWASP Top Ten Vulnerability
10-Insufficient Logging&Monitoring
47
OWASP Top Ten Vulnerability
10-Insufficient Logging&Monitoring
48
React Vulnerability
49
React Vulnerability
ReactJS is quite safe by design since
● String variables in views are escaped automatically
● With JSX you pass a function as the event handler, rather
than a string that can contain malicious code
But …
50
React Vulnerability
51
React Vulnerability
XSS via dangerouslySetInnerHTML
52
React Vulnerability
XSS via a.href attribute
53
React Vulnerability
XSS via a.href(base64 encoded data)
54
React Vulnerability
XSS via attacker controlled props
55
Any
Question?
56
Resources
● owasp
● slideshare.net/kseniadmitrieva
● stackoverflow.com/questions/33644499/

More Related Content

PDF
The Next Generation Security
PDF
Owasp and friends
PDF
GECon2017_ Security testing and selenium tests can you do one using the other...
PPTX
[Cisco Connect 2018 - Vietnam] Eric rennie sw cisco_connect
PPTX
Assume breach, layered security in Azure tested and explained
PDF
Secure Coding for Java - An Introduction
PDF
Equifax & Apache Struts Vulnerability CVE-2017-5638
PPTX
Design highly available and secure system
The Next Generation Security
Owasp and friends
GECon2017_ Security testing and selenium tests can you do one using the other...
[Cisco Connect 2018 - Vietnam] Eric rennie sw cisco_connect
Assume breach, layered security in Azure tested and explained
Secure Coding for Java - An Introduction
Equifax & Apache Struts Vulnerability CVE-2017-5638
Design highly available and secure system

What's hot (16)

PDF
Cisco connect winnipeg 2018 anatomy of an attack
PPTX
Hacking liferay
PPTX
ISO 27k talk for django meet up
PDF
Anatomy Of An Attack
PPTX
CLUSIR INFONORD OWASP iot 2014
PDF
Re solution - corona virus cyber security infographic
PPTX
WordPress Security - What to do, What NOT to do
PDF
Secure Coding For Java - Une introduction
PDF
certificate
PPTX
ALPSP Conference - Pierre Montagano - Code Ocean - Sept 14 2017
PDF
42 minutes to secure your code....
PDF
Basic detection tests of McAfee ENS + MVISION Insights usage for SunBurst threat
PDF
2014_EMTieghi_Industrial_Security-templateSERVI
PDF
OWASP, PHP, life and universe
PDF
Mod Security
PPTX
شهادات تاهلية1
Cisco connect winnipeg 2018 anatomy of an attack
Hacking liferay
ISO 27k talk for django meet up
Anatomy Of An Attack
CLUSIR INFONORD OWASP iot 2014
Re solution - corona virus cyber security infographic
WordPress Security - What to do, What NOT to do
Secure Coding For Java - Une introduction
certificate
ALPSP Conference - Pierre Montagano - Code Ocean - Sept 14 2017
42 minutes to secure your code....
Basic detection tests of McAfee ENS + MVISION Insights usage for SunBurst threat
2014_EMTieghi_Industrial_Security-templateSERVI
OWASP, PHP, life and universe
Mod Security
شهادات تاهلية1
Ad

Similar to Web Application Penetration (20)

PDF
Web Security
PDF
OWASP Bulgaria
PDF
[OWASP-Bulgaria] G. Geshev - Chapter Introductory Lecture
PPTX
Splunk Enterprise for InfoSec Hands-On Breakout Session
PDF
Application Security on a Dime: A Practical Guide to Using Functional Open So...
PPTX
A Closer Look at Isolation: Hype or Next Gen Security?
PPT
OWASP an Introduction
PPTX
Looking Forward… and Beyond - Distinctiveness Through Security Excellence
PPTX
PPTX
GDG Dev Fest 2014 Cyber Security & Bangladesh (Raffiqunnabi Rumman )
PPT
OWASP_Top_10_Introduction_and_Remedies_2017.ppt
PDF
Cyber Security and Cloud Computing
PPTX
Using a Network Model to Address SANS Critical Controls 10 and 11
PDF
2014 09-04-pj
PPTX
Java application security the hard way - a workshop for the serious developer
PDF
SAP (in)security: New and best
PPTX
How Malware Works - Understanding Software Vulnerabilities
PDF
OWASP Top 10 2007 for JavaEE
PDF
OWASP (Open Web Application Security Project) .pdf
PDF
Automatic detction of web apps vulnerability
Web Security
OWASP Bulgaria
[OWASP-Bulgaria] G. Geshev - Chapter Introductory Lecture
Splunk Enterprise for InfoSec Hands-On Breakout Session
Application Security on a Dime: A Practical Guide to Using Functional Open So...
A Closer Look at Isolation: Hype or Next Gen Security?
OWASP an Introduction
Looking Forward… and Beyond - Distinctiveness Through Security Excellence
GDG Dev Fest 2014 Cyber Security & Bangladesh (Raffiqunnabi Rumman )
OWASP_Top_10_Introduction_and_Remedies_2017.ppt
Cyber Security and Cloud Computing
Using a Network Model to Address SANS Critical Controls 10 and 11
2014 09-04-pj
Java application security the hard way - a workshop for the serious developer
SAP (in)security: New and best
How Malware Works - Understanding Software Vulnerabilities
OWASP Top 10 2007 for JavaEE
OWASP (Open Web Application Security Project) .pdf
Automatic detction of web apps vulnerability
Ad

Recently uploaded (20)

PDF
Zenith AI: Advanced Artificial Intelligence
PDF
Unlock new opportunities with location data.pdf
PPT
Module 1.ppt Iot fundamentals and Architecture
DOCX
search engine optimization ppt fir known well about this
PPTX
O2C Customer Invoices to Receipt V15A.pptx
PDF
Hindi spoken digit analysis for native and non-native speakers
PDF
DASA ADMISSION 2024_FirstRound_FirstRank_LastRank.pdf
PDF
1 - Historical Antecedents, Social Consideration.pdf
PPTX
Final SEM Unit 1 for mit wpu at pune .pptx
PDF
NewMind AI Weekly Chronicles – August ’25 Week III
PPT
What is a Computer? Input Devices /output devices
PDF
Developing a website for English-speaking practice to English as a foreign la...
PDF
TrustArc Webinar - Click, Consent, Trust: Winning the Privacy Game
PDF
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
PDF
CloudStack 4.21: First Look Webinar slides
PDF
Getting started with AI Agents and Multi-Agent Systems
PDF
STKI Israel Market Study 2025 version august
PPTX
observCloud-Native Containerability and monitoring.pptx
PDF
From MVP to Full-Scale Product A Startup’s Software Journey.pdf
PDF
Five Habits of High-Impact Board Members
Zenith AI: Advanced Artificial Intelligence
Unlock new opportunities with location data.pdf
Module 1.ppt Iot fundamentals and Architecture
search engine optimization ppt fir known well about this
O2C Customer Invoices to Receipt V15A.pptx
Hindi spoken digit analysis for native and non-native speakers
DASA ADMISSION 2024_FirstRound_FirstRank_LastRank.pdf
1 - Historical Antecedents, Social Consideration.pdf
Final SEM Unit 1 for mit wpu at pune .pptx
NewMind AI Weekly Chronicles – August ’25 Week III
What is a Computer? Input Devices /output devices
Developing a website for English-speaking practice to English as a foreign la...
TrustArc Webinar - Click, Consent, Trust: Winning the Privacy Game
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
CloudStack 4.21: First Look Webinar slides
Getting started with AI Agents and Multi-Agent Systems
STKI Israel Market Study 2025 version august
observCloud-Native Containerability and monitoring.pptx
From MVP to Full-Scale Product A Startup’s Software Journey.pdf
Five Habits of High-Impact Board Members

Web Application Penetration